Adobe on Tuesday informed customers that it has patched 26 vulnerabilities in its Acrobat and Reader products, including 11 critical flaws that can be exploited to bypass security features and for arbitrary code execution.
The vulnerabilities impact the Windows and macOS versions of Acrobat DC, Acrobat Reader DC, Acrobat 2020, Acrobat Reader 2020, Acrobat 2017, Acrobat Reader 2017, Acrobat 2015 and Acrobat Reader 2015.
The nine critical bugs that can be exploited for arbitrary code execution have been described as out-of-bounds write, use-after-free and buffer error issues. The remaining two critical vulnerabilities can allow an attacker to bypass security features.
The other flaws patched this week have been rated important and they can lead to memory leaks, privilege escalation, information disclosure and denial-of-service (DoS).
Independent security experts and representatives of Qihoo 360, Offensive Security, Arizona State University, North Carolina State University, Renmin University of China, the Chinese Academy of Sciences, the QiAnXin Technology Research Institute, and Tencent have been credited for reporting these security holes to Adobe.
The software giant says it’s not aware of any attacks exploiting these vulnerabilities.
Adobe also informed customers on Tuesday that it has patched a vulnerability in its Lightroom Classic photo editing tool.
“Adobe released two patches for the August Patch Tuesday, addressing Adobe Lightroom and Acrobat, but has also increased the number of out-of-band updates it has released,” Richard Melick, senior technical product manager at Automox, told SecurityWeek.
“In July alone, Adobe delivered 19 security vulnerability patches, 7 of which came after Patch Tuesday. Whether this is due to the increased usage, and thus data collection, of their products with more folks remote or an increase in vulnerability research, the uptick in releases shows promise for Adobe’s approach to product security. With a patch released every week from Adobe, it also shows that waiting until Patch Tuesday to research and deploy the updates could be leaving endpoints susceptible to known vulnerabilities,” Melick added.
Related: Adobe Patches Critical Vulnerabilities in Media Encoder, Download Manager
Related: Adobe Patches Critical Code Execution Flaws in Bridge, Photoshop, Prelude
Related: Adobe Patches 18 Critical Code Execution Flaws Across Five Products

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
- Mozilla Patches High-Severity Vulnerabilities With Release of Firefox 111
- Microsoft: 17 European Nations Targeted by Russia in 2023 as Espionage Ramping Up
Latest News
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Oleria Scores $8M Seed Funding for ID Authentication Technology
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- News Analysis: UK Commits $3 Billion to Support National Quantum Strategy
- Malicious NuGet Packages Used to Target .NET Developers
